Comments

There is definitely a logic to these codenames. WATERWITCH is used by "Tactical Operators" (commandos) for wetwork, the assassination or rendition of persons using targeted phones. It's good to know that NSA aren't entirely beholden to drone technology; as in the title of a Petri movie, "We Still Kill The Old Way".

It's also clear that 'active interrogator' is a description of a basestation that impersonates a cell tower. By controlling the timing and power of the captive phone's RF emissions, it interrogates actively. This is analogous to passive and active attacks on cryptosystems.

The point is GSM will "handover" to whichever is the strongest BTS it receives.

So whilst a traditional tower BTS five miles down the road might be pushing 20watts a handheld unit pushing 100mW that is less than 250yards away might well be stronger so the targets phone will handover to the handheld active interrogator...

from the capabilities, certainly. But from the viewpoint that you need a proof of nsa associated with killing people, it would be interesting, if we could know on what airoplaine active interrogator is mounted.

Given that the display is an oddball size of e-ink, and that there are only one or two companies making e-ink displays, it seems like it would be easy to figure out (at least for people in the vending company) who is procuring the parts, and maybe unmask the company that is making the stuff for the NSA, or at least unmask a front company used for procurement.

Hamid Karzai was in the midst of negotiating a security agreement with the United States when he met a 4-year-old girl who had lost half her face in an American airstrike.Five months later, the Afghan president’s eyes welled with tears as he described visiting the disfigured little girl at a hospital. He took long pauses between words. Sitting behind his desk Saturday night, the man who has projected a defiant image toward the West suddenly looked frail.

That day, I wished she were dead, so she could be buried with her parents and brothers and sisters” — 14 of whom had been killed in the attack — he said.

In an unusually emotional interview, the departing Afghan president sought to explain why he has been such a harsh critic of the 12-year-old U.S. war effort here. He said he’s deeply troubled by all the casualties he has seen, including those in U.S. military operations. He feels betrayed by what he calls an insufficient U.S. focus on targeting Taliban sanctuaries in Pakistan. And he insists that public criticism was the only way to guarantee an American response to his concerns.

Of course, there other issues as well, secondary to civilian casualties. The private security firms, the parallel government structures, the contracts given to people, to individuals, causing corruption. And, of course, in a deeper way, reflecting a deeper lack of agreement between us, the way the so-called war on terror was fought. The sanctuaries were left alone outside Afghanistan and Pakistan, but the civilian villages were attacked. So when I say civilian casualties and when I say the incorrect strategy, the attack on the Afghan villages, that is exactly the crux of the difficulties.’’

What we see here is a spectacular compromise of extremely important classified information. Enemies of the US now know a lot more about American methods and capablities than they may have known before.

One can be sure that all of these documents have been gone over with a fine-toothed comb by Moscow and Beijing.

One can be sure that all of these documents have been gone over with a fine-toothed comb by Moscow and Beijing.

Yes, probably four or five years before Ed Snowden started collecting the info. Simple logic dictates that if Ed could gather that amount of information and the NSA did not have a clue, then their internal controls are grossly deficient to the point of uslessness.

And a study of human nature will tell you that others will have exploited such failings for profit or ideology.

As for "capabilities" nearly all of them are stolen / copied from other people in the private sector, usually without accreditation or payment.

For this TAO device go and read the 1996 book "Takedown" by Tsutomu Shimomura and journalist John Markoff.

In there you will find a description of Shimomura modifing a mobile phone into a tracking device. He is also known to have worked for and with the NSA, as well as testifing before Congress on the security --or lack there of-- cellular phones.

All of which raises the "Chicken and egg" question over this device and Shimomura... Did Shimomura think up the attack himself or was it something he saw in the NSA and copied, and then wrote up as a self promotion and in the process perform what you call "a spectacular compromise of extremely important classified information".

The simple fact is all the TAO catalogue has shown is just how far behind the curve the NSA is, and just what a bunch of idea stealing low lifes they are, and thus not due any respect what so ever.